Filename | Size | Description | |
---|---|---|---|
![]() | 2XDESFOU.TXT | 6795 | Nx2 DES Found Weak |
![]() | 2XISOLAT.TXT | 10270 | 2x Isolated Double-DES: Another Weak Two-Level DES Structure |
![]() | ANDERSON.TXT | 72868 | Anderson's RSA trapdoor can be broken (Postscript file) |
![]() | CFSDRAFT.TXT | 94180 | Cryptographic FIle System (Must run through nroff to read) |
![]() | CHAUM_DI.TXT | 34187 | Unconditional Sender and Recipient Untraceability |
![]() | CRYPTLES.TXT | 332312 | A lesson in Cryptography (Postscript) |
![]() | CRYPTOGR.TXT | 65831 | CRYPTOGRAPHY: TRENDS IN TECHNOLOGY AND POLICY |
![]() | DES-BREA.TXT | 276881 | Breaking DES (Postscript) |
![]() | IDEAFAST.TXT | 9830 | Speed of DES/IDEA implementations |
![]() | IDEA_PS.TXT | 242690 | Overview of IDEA Encryption Method |
![]() | LADDERBL.TXT | 4241 | Large Block DES Newsletter, Vol. I, No. 1 |
![]() | LADDERDE.TXT | 11088 | Ladder-DES: A Proposed Candidate to Replace DES |
![]() | MD4_DOC.TXT | 30512 | The MD4 Message Digest Algorithm |
![]() | MD5-CRYP.TXT | 6026 | Excerpt from, "Analysis and Design of Cryptographic Hash Func." |
![]() | MD5_DOC.TXT | 37441 | The MD5 Message-Digest Algorithm |
![]() | MIMIC_PS.TXT | 181601 | Info on MIMIC system (Postscript) |
![]() | NIST-CRY.TXT | 346030 | Public-Key Cryptography (NIST SP 800-2) |
![]() | NORTONS_.TXT | 8612 | Info on Norton Utilities Diskreet program |
![]() | POLYGONA.TXT | 8611 | THE CRYPTOGRAPHIC USES OF POLYGONAL SEQUENCES |
![]() | RABIN-AL.TXT | 8111 | DESCRIPTION OF THE RABIN PUBLIC KEY CRYPTOSYSTEM |
![]() | RITTER-C.TXT | 14444 | Design of Cryptosystem CLOAK |
![]() | RSAISBRO.TXT | 12306 | Public Key Cryptography is Easy to Break |
![]() | RSA_NEWS.TXT | 47625 | CIPHERTEXT, RSA Newsletter, Vol 1, No. 1 |
![]() | SHS_DOC.TXT | 24687 | SECURE HASH STANDARD (SHS) |
![]() | WHY_CRYP.TXT | 184581 | Why Cryptosystems Fail (postscript) |
![]() | CLIPPER.ZIP | 5990 | President Clinton Brings Us The CLIPPER Chip, Yeah Boyee! |
![]() | CRYPT.ZIP | 3674 | Simple Cryptology, By A Simple Cryptologist |
![]() | CRYPTINF.ZIP | 121826 | Info On Public Key Encryption From N.I.S.T. |
![]() | DES.ZIP | 84828 | DES Encryption Turbo C Routines |
![]() | DSS9115.ZIP | 15240 | Information On Digital Signature Algorithm (DSA) |
![]() | MUTATN10.ZIP | 19735 | Cryptography For Hackers/Phreakers And Others |
![]() | NSAPAPER.ZIP | 9783 | NSA Papers: Interview W/NSA Concerning Encryption Techniques |
![]() | ONETIME.ZIP | 9629 | One-Time Cypher System For The IBM PC |
![]() | HANDLES.ZIP | 14754 | Anonymity and privacy on the network |
![]() | NDC5.ZIP | 3985 | Crypto program |
![]() | SKIPJACK.ZIP | 9690 | The Skipjack Encryption Algorythm Review |
![]() | DESBLT.ZIP | 8872 | Data Encryption Standard |
![]() | DESDOC.ZIP | 8872 | Data Encryption Standard Fact Sheet |
![]() | DESVAL.ZIP | 1563 | DES Validation List |
![]() | epw12.zip | 4959 | EPW 1.2 EXE & COM File Password Protector |
![]() | koh101.zip | 4959 | KOH Disk Encryption System V1.01 |
![]() | pass.zip | 3683 | PassEXe & PassCOM Password Protectors For EXE & COM Files |
![]() | globs10.zip | 217512 | Global Securit 32-bit v1.0 (more secure than PGP?) |
![]() | hnseek41.zip | 214108 | Hide and Seek v4.1 - hides data in .GIF's |
![]() | puff20.zip | 368930 | Puffer v2.0 - Data and Email encryptor for Windoze |
![]() | stega14.zip | 14712 | Steganos v1.4 - Stenographic tools (hide data in img) |
![]() | attack.txt | 42820 | PGP Attack FAQ v2.0 |
![]() | cryptfaq.txt | 122400 | Cryptology FAQ v1.0 |
![]() | pgpfaq.txt | 145330 | PGP FAQ - very informative - all 3 parts in this file |
![]() | pgpjump.txt | 17543 | PGP Jumpstart Docs - 1 2 3 pgp setup instructions |
![]() | ppfaq104.txt | 35664 | PGP Passphrase FAQ v1.04 |
![]() | rsafaq.txt | 169559 | RSA FAQ v2.0 - All 3 parts in this file |
![]() | secd13c.zip | 108131 | SecureDrive V1.3c - create encrypted part. on disk |
Before you download PGP from anywhere, understand this legal issue. This is why I di dn't not want the responsibility of distributing this code.
Furthermore, the Government is in ultra-paranoia mode and I have decided to not distribute PGP directly from this archive, however you can get it from the follo wing sources:
PGP 2.6.2 is the officially supported version distributed by MIT. It is legal to use this version in the U.S. for non-commercial purposes (i.e., you cannot sell it or the functionality it provides). You can find it at these locations:
Return to L0pht Heavy Industries, Home of this archive.